-
1
Trojan message attack on the concatenated hash functions
Published 2016-08-01Subjects: “…hash functions…”
Get full text
Article -
2
Breaking novel and lightweight digital <sub>s</sub> ignature scheme
Published 2013-07-01Subjects: Get full text
Article -
3
One-way hash function with chaotic dynamic parameters
Published 2008-01-01Subjects: “…hash function…”
Get full text
Article -
4
Homologous homoclinic solutions based on DPI traffic asymmetry
Published 2016-12-01Subjects: Get full text
Article -
5
New indifferentiability security proof of MDPH hash function
Published 2022-07-01Subjects: Get full text
Article -
6
Extended integer tent maps and dynamic hash function
Published 2010-01-01Subjects: “…hash function…”
Get full text
Article -
7
A secure authentication method based on hash function for RFID system
Published 2017-06-01Subjects: Get full text
Article -
8
Sketch-based data plane hardware model for software-defined measurement
Published 2017-10-01Subjects: Get full text
Article -
9
Secure resource metering and accounting with hash chain in cloud storage
Published 2013-08-01Subjects: Get full text
Article -
10
Research on optimization of indoor positioning batch ranging system based on DS-TWR algorithm
Published 2022-01-01Subjects: Get full text
Article -
11
Research and Implementation of SlAP Monitor in LTE Network
Published 2013-01-01Subjects: Get full text
Article -
12
Cryptanalysis of some chaos-based keyed hash functions
Published 2011-01-01Subjects: Get full text
Article -
13
Android malware detection method based on SimHash
Published 2017-11-01Subjects: Get full text
Article -
14
-
15
Design keyed Hash function based on couple chaotic system
Published 2006-01-01Subjects: Get full text
Article -
16
Secure password-based authentication scheme with anonymous identity without smart cards
Published 2008-01-01Subjects: Get full text
Article -
17
Redactable blockchain supporting trapdoor revocation and limited number of redactions
Published 2023-07-01Subjects: Get full text
Article -
18
Review on cross-chain technology research of blockchains
Published 2022-12-01Subjects: Get full text
Article -
19
Blockchain covert communication scheme based on the cover of normal transactions
Published 2022-08-01Subjects: Get full text
Article -
20
New chameleon Hashing of secure and privacy-preserving vehicular communications
Published 2014-11-01Subjects: Get full text
Article